final Flashcards

(81 cards)

1
Q

information

A

data that have been organized so that they have meaning and value to the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

knowledge

A

data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current business problem.

data turns into information which turns into knowledge so it can be used by a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hardware

A

devices like the professor, monitor, keyboard, and printer; together they accept, process, and display data and information

touchable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

software

A

program or collection of programs that enable the hardware to process data

untouchable, no substance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data

A

residing in individual databases(a collection of related files and tables that contain specific data) or drawn from multiple sources (mashup)

information without context

describes products, customers, events, activities, and transactions that are recorded, classified, and stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

network

networking

A

connecting system (wireless or wireline) that permits different computers to share resources

group of two or more computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

procedures

A

the instructions for combining the above components to process info and generate the desired output

a component of CBIS; instructions involved in various business processes done by people, not IT services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

expert systems (ES)

A

attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain. takes various inputs to try and duplicate a human/decision making.
like artificial human intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Porter’s primary activities of the value chain model

A
  1. inbound logistics (raw materials)
  2. operations (pulling it together)
  3. outbound logistics (retailer/distribution)
  4. marketing/sales (media)
  5. services (make sure customer is still happy; installation and repair)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

porter’s secondary activities of the value chain model

A
  1. the firm’s infrastructure (legal/accounting)
  2. human resources management (personnel/recruiting)
  3. product and technology development (product and process design)
  4. procurement (supplier management)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

strategies for competitive advantage

A
  1. cost leadership strategy
  2. differentiation strategy
  3. innovation strategy
  4. organizational effectiveness strategy
  5. customer orientation strategy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

business IT alignment

A
  1. organizations view IT as an engine of innovation
  2. internal and external customers are important
  3. rotating business and IT professionals across departments and job functions
  4. provide clear overarching goals for everyone
  5. employees understand how the company makes or loses money
  6. create a vibrant and inclusive company culture

the tight integration of the IT function with the organization’s strategy, mission, and goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

infrastructure

A

basic systems of communications, transportation, and energy facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

business process reengineering (BPR)

A

strategy for making an organization’s business processes more productive and profitable

completely redesigning the business process.
change the way you’re doing things to be more efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data governance

A

involves a formal set of business processes and policies that are designed to ensure that data are handled in a specific way

approach to managing information (data) across an entire organization so its not duplicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data isolation

A

applications cannot access data associated with other applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data integrity

A

data meet certain constraints

for example: there are no alphabetical characters in a social security number field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

data hierarchy

A
bit
byte
field
record
data file/table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

bit

A

the smallest unit of data a computer can process (0 or 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

byte

A

a single character; letter number, or symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

field

A

a logical grouping of characters into a word, small group or words, or an identification number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

record

A

a logical grouping of related fields, such as the students name, the courses taken, the date, and grade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

data file/table

A

logical grouping of related records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

primary key

A

a field that uniquely identifies a record so that is can be retrieved, updated, and sorted

example: a student record at JMU would use the unique student’s number on their JACard as the primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
foreign key
field/group of fields in one table that uniquely identifies a row of another table; used to establish and enforce a link between two tables a primary key in another table
26
big data
collection of data so big and complex that it is difficult to manage using traditional database management systems
27
characteristics of big data
1. volume- machine generated data is generated in much larger quantities than nontraditional data 2. velocity- rate at which data flow into an organization 3. variety- big data formats change rapidly, can come from numerous widely varied sources
28
data warehouse
repository of historical data that are organized by subject to support decision makers in the organization
29
knowledge management
process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in an unstructured format efficient handling of information and resources within a commercial organization
30
LAN
local area network 2 or more devices in limited geographical region, fast, cheap, with distance limitations a group of computers and associated devices that share a common communications line or wireless link to a server
31
WAN
wide area network
32
TCP/IP
3 basic functions - 1. manages the movement of data packets - 2. sequences the transfer of packets - 3. acknowledges the packets that have been transmitted 4 layers - 1. application layer - 2. transport layer - 3. internet layer - 4. network interface layer IP: responsible for disassembling, delivering, and re-assembling the data during transmission
33
server
provides computing services a computer, computer program, or device that provides functionality for all other programs or devices called clients
34
clients
user computers request applications, data, and processing recipient of the data computers, such as users' personal computers, that use any of the services provided by servers
35
database
repository or data store that is organized for efficient access, search, retrieval, or update logical grouping of related data files (database tables) typically organized by fields, records, and files multiple tables
36
software as a service (SAAS)
designed for end users a service provider hosts the application at its data center and customers access it via a standard web browser treating software as a utility
37
central processing unit (CPU)
part of hardware manipulates the data and controls the tasks performed by the other components performs the actual computation or "number crunching" inside any computer
38
primary storage
part of hardware temporarily stores data and program instructions during processing
39
input devices
any machine that feeds data into a computer accept data and instructions and convert them to a form that the computer can understand example: a keyboard is an input device, whereas a display monitor is an output device
40
output devices
present data and information in a form people can understand
41
main memory (primary/main storage)
stores 3 types of info briefly 1. data to be processed by the CPU 2. instructions for the CPU as to how to process the data 3. operating system programs that manage various aspects of the computer's operation four main types 1. register 2. cache memory 3. random access memory 4. read only memory
42
random access memory (RAM)
holds a software program and small amounts of data for processing type of computer memory that can be accessed randomly most common type of memory found in computers and other devices
43
read only memory (ROM)
place where certain critical instructions are safeguarded the storage is non volatile and retains the instructions when the power is turned off, not accessible by you, software protected that cant be destroyed
44
operating system
"director" of your computer system's operations and supervises the overall operation of the computer by monitoring the computer's status, scheduling operations, and managing input and output processes provides an interface between the user and hardware
45
ethical issues in IT
- privacy issues: involve collecting, storing, and disseminating information about individuals - accuracy issues: involve the authenticity and correctness of information that is collected and processed - property issues: involve the ownership and value of information - accessibility issues: revolve around who should have access to information and whether they should pay a fee for this access
46
privacy policies/codes
an organization's guidelines for protecting the privacy of its customers, clients, and employees
47
vulnerabilities
a weakness in an info system that gives a threat the opportunity to compromise an asset
48
CIA triad
1. confidentiality- preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; responsibility of "custodians of info" 2. integrity- guarding against improper information modification or destruction; accurate and reliable data; includes ensuring information non-repudiation and authenticity 3. availability- ensuring timely and reliable access to info and use of information
49
denial of service (DOS)
the unauthorized prevention of access to resources or the delaying of time-critical operations
50
distributed denial of service (DDOS)
the use of many compromised systems to cause denial of service for users of the targeted system multiple attacks
51
phishing
attempting to compromise a user by masquerading as a trustworthy entity in electronic communication
52
malware
"malicious software" | software or code specifically designed to exploit a computer/the data it contains without the users consent
53
worm
usually are triggered by another event to begin spreading computer program that adversely affects computers and propagate through the network without the users consent
54
enterprise resource planning (ERP) systems
info systems that take a business process view of the overall organization to integrate the planning, management, and use of all an organizations resources, employing a common software platform and database
55
access
to use, to read data from or write data to a mass storage device; a privilege to use a computer information in some manner; more of a database
56
application software
a set of computer instructions that provides more specific functionality to a user includes database programs like access, word processors, web browsers, and spreadsheets
57
bluetooth
chip technology that enables short-range connection (data and voice) between wireless devices specification used to create small personal area networks, which is a computer network used for communication between computer devices
58
chief info officer (CIO)
request applications, data, and processing recipient of the data computers, such as users personal computers, that use any of the services provided by the servers
59
column
field column of data containing a logical grouping of characters into a word or a small group of words example: last name or social security (vertical)
60
crowdsourcing
a process where an organization outsources a task to an undefined, generally large group of people in the form of an open call
61
excel
spreadsheet program developed by microsoft these spreadsheets present tables of values arranged in rows and columns to sort information
62
extranet
a network that connects parts of the intranets of different organizations and enables business partners to communicate securely over the internet using virtual private networks business-to-business commerce
63
horizontal market software
designed for a wide field intended for everyone example: microsoft office
64
http
http is the secure version of http, the protocol over which data is sent between your browser and the website that you are connected to the S at the end of https stands secure; it means all communications between your browser and the website are encrypted
65
internet
a major global WAN that connects approx 1 million organizational computer networks
66
intranet
a private network that uses internet software and tcp/ip protocols closed network within an organization enter through username and password a local or restricted communications network, especially a private network created using world wibe web software
67
internet protocol (IP) address
an assigned address that uniquely identifies a computer on the internet responsible for disassembling, delivering, and re-assembling the data during the transmission internet assigned address for a specific site
68
modem
device that converts signals from analog to digital and vice versa a combined device for modulation and demodulation example: translate/converts between the digital data of a computer and the analog signal of a telephone line
69
off the shelf software
low up-front cost, many features, free upgrades, slow to adapt
70
open source software
software that is free and available and may be redistributed and modified software made available in source code form at no cost to developers
71
people
the individuals who use hardware and software, interface with it, or utilize its output only difference between IT and IS is people
72
protocol
the set of rules and procedures governing transmissions across a network procedures and rules need to follow; allows varying software to communicate
73
router
a communications processor that routes messages from a LAN to the internet, across several connected LANs, or across a wide area network such as the internet takes information that arrives through your broadband signal via a modem, decipher it, and deliver it to your computer choose the best route for the data packet so that you receive the information quickly
74
row
record data is stored horizontally in a row
75
system development lifecycle (SDLC)
series of steps, or phases, that provides a model for the development and lifecycle management of an application or piece of software traditional way of designing and developing a new system
76
security threats
passwords, viruses, worms, DOS, phishing,malware, trojan horse, rogue access points, misconfiguration, user error
77
server virtualization
uses a computer to allow that server to behaves as if it were multiple servers example: server could act as windows 10, and server could act as a mac
78
social networking
relationships and flows between people, groups, organizations, animals, computers or other information/knowledge processing entities
79
software license
allowing an individual or group to use a piece of software nearly all applications are licensed rather than sold
80
strategic decisions
decisions you put into your business that are going to affect the way your company is heading getting all the stakeholders in the room to look to plan into the future decisions based on data
81
vertical market software
aimed at addressing the needs software devloped for niche applications or for a specific clientele designed for a specific industry or market